Lattice-based group signatures with forward security for anonymous authentication

被引:3
|
作者
Chen, Simin [1 ]
Chen, Jiageng [1 ]
机构
[1] Cent China Normal Univ, Sch Comp Sci, Wuhan, Peoples R China
关键词
Lattice-based cryptography; Forward security; Group signature; ENCRYPTION;
D O I
10.1016/j.heliyon.2023.e14917
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Group signatures allow users to sign messages on behalf of a group without revealing authority is capable of identifying the user who generated it. However, the exposure of the user's signing key will severely damage the group signature scheme. In order to reduce the loss caused by signing key leakage, Song proposed the first forward-secure group signature. If a group signing key is revealed at the current time period, the previous signing key will not be affected. This means that the attacker cannot forge group signatures regarding messages signed in the past. To resist quantum attacks, many lattice-based forward-secure group signatures have been proposed. However, their key-update algorithm is expensive since they require some costly computations such as the Hermite normal form (HNF) operations and conversion from a full-rank set of lattice vectors into a basis.In this paper, we propose the group signature with forward security from lattice.In comparison with previous works, we have several advantages: Firstly, our scheme is more effective since we only need to sample some vectors independently from a discrete Gaussian during the key-update algorithm. Secondly, the derived secret key size is linear instead of quadratic with the lattice dimensions, which is more friendly towards lightweight applications. Anonymous authentication plays an increasingly critical role in protecting privacy and security in the environment where private information could be collected for intelligent analysis. Our work contributes to the anonymous authentication in the post-quantum setting, which has wide potential applications in the IoT environment.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Lattice-Based Universal Designated Verifier Signatures
    Li, BaoHong
    Liu, YanZhi
    Yang, Sai
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE 2018), 2018, : 329 - 334
  • [32] Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme
    Wang Fenghe
    Wang Xuan
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 853 - 858
  • [33] LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks
    Peng, Shuangrong
    Tang, Xiaohu
    Xiong, Ling
    Zhu, Hui
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (5) : 2474 - 2491
  • [34] LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks
    Shuangrong Peng
    Xiaohu Tang
    Ling Xiong
    Hui Zhu
    Peer-to-Peer Networking and Applications, 2023, 16 : 2474 - 2491
  • [35] Anonymous Entity Authentication-Mechanisms Based on Signatures Using a Group Public Key
    Long, Zhaohua
    Lu, Jie
    Hou, Tangjie
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 1079 - 1086
  • [36] Enhanced lattice-based signatures on reconfigurable hardware
    Pöppelmann, Thomas (thomas.poeppelmann@rub.de), 1600, Springer Verlag (8731):
  • [37] Enhanced Lattice-Based Signatures on Reconfigurable Hardware
    Poeppelmann, Thomas
    Ducas, Leo
    Gueneysu, Tim
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 353 - 370
  • [38] Software Speed Records for Lattice-Based Signatures
    Gueneysu, Tim
    Oder, Tobias
    Poeppelmann, Thomas
    Schwabe, Peter
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 67 - 82
  • [39] Security engineering of lattice-based policies
    Bryce, C
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 195 - 207
  • [40] Asymptotically efficient lattice-based digital signatures
    Lyubashevsky, Vadim
    Micciancio, Daniele
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 37 - 54